c6fc / warcannonLinks
High speed/Low cost CommonCrawl RegExp in Node.js
β258Updated last year
Alternatives and similar repositories for warcannon
Users that are interested in warcannon are comparing it to the libraries listed below
Sorting:
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filteringβ210Updated 5 years ago
- Find cloud assets that no one wants exposed π βοΈβ350Updated 5 years ago
- Subdomain finderβ371Updated last year
- scylla.sh db dumps and moreβ139Updated 3 weeks ago
- Shadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious Sβ¦β238Updated 2 years ago
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registrationβ302Updated last week
- β83Updated 3 years ago
- Fast and stealthy Amazon S3 bucket enumeration tool for pentesters.β261Updated 4 months ago
- A wordlist that is kept up to date with the latest headlines to provide relevant words to human societyβ121Updated 3 years ago
- A Google/Bing Scraping tool for LinkedInβ93Updated 2 years ago
- automated web assets enumeration & scanning [DEPRECATED]β289Updated 2 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raiderβ139Updated 4 years ago
- Tools to assess the DNS security of web applicationsβ128Updated 3 years ago
- A tool to hunt for credentials in github wild AKA git*huntβ297Updated 3 years ago
- β259Updated last year
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Searchβ190Updated last year
- Search exposed EBS volumes for secretsβ302Updated 2 years ago
- Scans SPF and DMARC records for issues that could allow email spoofing.β134Updated 3 years ago
- Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered foβ¦β205Updated 2 years ago
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaboratorβ168Updated 4 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, anβ¦β144Updated 2 years ago
- A phased, evasive Path Traversal + LFI scanning & exploitation tool in Pythonβ200Updated 4 years ago
- WebStor efficiently enumerates all websites across your organizationβs networks and those in your DNS records - including cloud-hosted seβ¦β157Updated last year
- Scan DockerHub images that match a keyword to find secrets.β61Updated 4 years ago
- portscanner in javascriptβ69Updated 4 years ago
- Application and Service Fingerprintingβ133Updated 3 years ago
- automated password spraying toolβ147Updated 4 years ago
- Open a DNS server that knows no records but records every request. Used for DNS exfiltration.β69Updated 3 years ago
- Collection of scripts & fingerprinting tricks for Shodan.ioβ255Updated 5 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger toolβ267Updated 2 years ago